Search Results

There are 14973 results for: content related to: Protocol Derivation System for the Needham–Schroeder family

  1. Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC–DC current mode controlled boost converter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1053–1063, Manish Kumar Thukral and Karma Sonam Sherpa

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.665

  2. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template

    Security and Communication Networks

    Zhe Jin, Bok-Min Goi, Andrew Teoh and Yong Haur Tay

    Article first published online : 19 AUG 2013, DOI: 10.1002/sec.865

  3. You have free access to this content
    Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  4. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  5. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 361–372, Xuefeng Liu and Yuqing Zhang

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.584

  6. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543

  7. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Padmini Jaikumar and Avinash C. Kak

    Article first published online : 28 FEB 2012, DOI: 10.1002/sec.500

  8. A new intrusion detection method based on SVM with minimum within-class scatter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1064–1074, Wenjuan An and Mangui Liang

    Article first published online : 18 DEC 2012, DOI: 10.1002/sec.666

  9. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  10. Fast authentication mechanism with provable correctness for cluster-based VANETs

    Security and Communication Networks

    Jung-San Lee and Ya-Chieh Huang

    Article first published online : 14 JUN 2013, DOI: 10.1002/sec.818

  11. Identity-based optimistic fair exchange in the standard model

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1010–1020, Lei Zhang, Qianhong Wu and Bo Qin

    Article first published online : 26 NOV 2012, DOI: 10.1002/sec.652

  12. Efficient and adaptively secure broadcast encryption systems

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1044–1052, Mingwu Zhang, Bo Yang, Zhenhua Chen and Tsuyoshi Takagi

    Article first published online : 12 NOV 2012, DOI: 10.1002/sec.678

  13. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.571

  14. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.591

  15. Further analysis of pairing-based traitor tracing schemes for broadcast encryption

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 28–32, Tsu-Yang Wu and Yuh-Min Tseng

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.522

  16. A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1169–1175, Hui Zhao, Jonathan Z. Sun, Fengying Wang and Lei Zhao

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.694

  17. Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 614–624, Fengrong Zhang, Yupu Hu, Min Xie and Yongzhuang Wei

    Article first published online : 16 AUG 2011, DOI: 10.1002/sec.356

  18. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642

  19. Anonymous communication in overlay networks

    Security and Communication Networks

    Jian Ren, Yun Li, Tingting Jiang and Tongtong Li

    Article first published online : 29 MAR 2012, DOI: 10.1002/sec.539

  20. Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Article first published online : 15 FEB 2013, DOI: 10.1002/sec.683